...Lab 7.1 Module main () Declare String keepGoing = “y” While keepGoing == “y” Declare String clientName = “ “ Declare Real feetUTP = 0 Declare Real subTotal = 0 Declare Real taxCost = 0 Declare Real totalCost = 0 Call inputData (feetUTP, clientName) Call calcCosts (feetUTP, subTotal, taxCost, totalCost) Call displayBill (clientName, totalCost) End While End Module Lab 7.2 Lab 7.3 Module Main() Declare integer toPower = 2 Declare integer number = 2 Declare integer counter = 0 While Counter < 7 Set toPower = 2^Number Display 2 to the power of, “number,” is,”toPower,” Counter += 1 Number += 1 End While End Module Lab 7.4 Lab 7.5 Module Module1 Sub Main() Dim keepGoing As String = "yes" Do While keepGoing = "yes" pingMe() Console.Write("Enter yes if you want to run program again") keepGoing = Console.ReadLine() Loop Console.WriteLine("Press enter to continue. ..") Console.ReadLine() End Sub Sub pingMe() Dim counter As Integer = 5 Do While counter > 0 Console.WriteLine("Count down . ") counter = counter - 1 Loop Console.WriteLine("Now ping. ..") Shell("Ping.exe 127.0.0.1", , True) Console.Out.WriteLine(" ") End Sub End Module Lab 7.6 Module Module1 Sub Main() Dim keepGoing As String = "y" ...
Words: 262 - Pages: 2
...CMIS 102 Hands-On Lab // Week2 Overview: This hands-on lab allows you to follow and experiment with the critical steps of developing a program including the program description, analysis, test plan, design, and implementation with C code. Program Description: This program will sum two integer numbers to yield a third integer number. It will also divide two float numbers to yield a third float number. Once the calculations are made the results of all the numbers will be printed to the output screen. Analysis: We will use sequential programming statements. We will define 3 integer numbers: a,b,c. c will store the sum of a and b. We will define 3 float numbers: f,g,h. h will store the quotient of f and g. Test Plan: To understand this program the following input numbers could be used for testing: a = 10 b = 20 c = a + b = 10 + 20 = 30 f = 75.0 g = 3.0 h = f/g = 75.0/3.0 = 25.0 Design using Pseudocode: // This program will sum two integer numbers to yield a third integer number. // It will also divide two float numbers to yield a third float number. // Declare variables Declare a,b,c as Integer Declare f as Float // Set values of Integers Set a=10 Set b=20 Set c=a+b // Print c Print a,b,c Set f=75.0 Set g=3.0 Set h=f+g // Print h print f,g,h C Code The following is the C Code that will compile in execute in the online compilers. // C code // This program will sum two integer numbers to yield a third integer number. // It will also...
Words: 458 - Pages: 2
...Supporting individuals with dementia P3 Describe the legislation and frameworks which govern work with individuals with dementia Enduring power of an attorney act- This is a legal tool that allows you to enact someone to make certain decisions on your behalf, this can include finances, health and welfare and also legal help. An attorney is appointed when you are no longer able to make decisions yourself or if you are not of sound mind. Enduring power of an attorney act allows you to choose someone you trust to make decisions on your behalf for example a trusted family member, this person must be over 18, be of sound mind and also be willing to take on this job. If there are no family or friends available one can be appointed to you. If an attorney is appointed to cover your finances such as things concerning property, they will do things on behalf of you such as paying bills, collecting income and/or benefits ensuring everything is there and selling your house. This can be useful for someone with dementia as if it comes to the stage where the person is no longer fit to take care of these financial issues an attorney can be enacted to help them out, also if the person with dementia is safer being put into an home an attorney can cover selling the house at the right price. If an attorney is appointed to deal with health and welfare they will have the job of deciding where is best to live, or day to day needs such as what you eat. If you wish you can give your attorney...
Words: 3044 - Pages: 13
...economics and business”. The authors state that while e-commerce, the sale of goods over the internet, has boosted online sales, especially products like books, CDs and computer products; it has also raised important new ethical challenges. These challenges revolve around four main issues: security, privacy, identity and transaction non-refutability. There is no doubt that a new ethical dilemma has arisen and these authors propose two universal principles that must be upheld by internet commerce. The first ethical challenge of internet commerce is security, commonly referred to as “hacking”, ‘cracking”, or “page jacking”. Internet security breaches involve trespassing or breaking into computer networks, websites, and mailboxes. Hackers will steal information from confidential files, steal services or damage a system by swamping a PC, a server or a network. The second ethical challenge relates to privacy, which involves protecting the collection, storage, processing, disseminating and destruction of personal information. They continue that no one is anonymous on-line and what is nirvana for direct marketers is a nightmare for any consumer who wants to protect his or her privacy. On-line advertising can be targeted with great precision today, thanks to “cookies”, a mall text files that companies install on the hard drives of people who visit their sites in order to tract their profiles and browsing habits. Protecting on-line consumers in any web transaction is a great challenge...
Words: 730 - Pages: 3
...merce and e-business has limitations Ignoring those limitations can cause problems because a company may have expectations that cannot be met, and therefore think the website is "not working" . WTGR .... Limitations of e-Commerce (e-Business) - you should understand some of the limitations and be able to explain these to a potential client because not everyone is convinced the internet will be a major way to conduct business - example TV has been around for a long time - but only a small percentage of all companies advertize on TV !! - radio - some very successful companies, like Sleep Country Canada advertise on radio KEY POINTS Schneider uses the term "Disadvantages" but we can interpret this to mean the same thing as "limitations" . WTGR . o Technical Limitations o Non-Technical Limitations o Technical Limitations costs of a technological solution some protocols are not standardized around the world reliability for certain processes insufficient telecommunications bandwidth software tools are not fixed but constantly evolving (ie. Netscape 3,4,4.7,4.75 etc.) integrating digital and non-digital sales and production information access limitations of dial-up, cable, ISDN, wireless some vendors require certain software to show features on their pages, which is not common in the standard browser used by the majority Difficulty in integrating...
Words: 394 - Pages: 2
...publishing skills to participate, making it easy for people to create and publish or communicate their work to the world. The nature of this technology makes it easy and popular way to communicate information to a much wider audience. There are number of different types of web 2.0 applications including wikis, blogs, social networking, folksonomies, podcasting & content hosting service, YouTube, Facebook, MySpace, and Flickr (Thomson, 2008). However, despite it greater advantageous to our world today, there are some threats involved on the other hand. In this essay, I will discuss some number of privacy and ethical issues associated with the use of this type of technologies. As well some threats such technologies pose for small Pacific Island communities. Lastly, I will discuss the reasons why a privacy bill should or should not be adopted in the Pacific. Ethical and privacy issues related with the use of web 2.0 technologies? Copyright is one of a major issue related with the use of web 2.0 technologies. This ethical issue is referring to copy of others information illegally, by means without the permission of the copyright holder. Using of web 2.0 technologies like Facebook, you tube and other applications nowadays are rapidly growth all over the world. So, this great revolution supports us in every aspects of life. For example, businesses use it to enhance business activities such as advertisement of their products and other related activities. In somehow, these great...
Words: 774 - Pages: 4
...TermPaperWarehouse.com - Free Term Papers, Essays and Research Documents The Research Paper Factory JoinSearchBrowseSaved Papers Home page » Social Issues Why Social Networking Sites Are Addictive In: Social Issues Why Social Networking Sites Are Addictive “Why Social Networking sites are so addictive” Next to the numerous games that often hooks are attention, another thing that most parents problems today towards their children is the social networking sites that is said to be addictive due to its unlimited offers. The connection that can be made between two people distant to each other is such a thing that you simply cannot resist. Not only is discovering new content through all the retweets almost invaluable, but simply striking a conversation about common interests or thanking people for retweets, is a joy! Once you've gotten involved in networking sites, things can escalate quickly. One reason these sites are so addictive is that there's a nonstop stream of messages, photos, updates and information coming from those in your network. If you have 10 friends, it shouldn't be a problem keeping up with them. If your network is 100 friends or more, you might end up online for hours every day, trying to check all of the updates. If you're trading messages back and forth with other members, you might find yourself even more caught up in the exchange, just as you would in a normal conversation. We’re able to communicate with so many people from all across the globe...
Words: 523 - Pages: 3
...never talked about this subject? Did the parents only want the email to see what he was up to, or his personal thoughts? Would there be something in the e-mail that would make them think differently of their son? Is it legal for the parents to see this email? Is this a violation of privacy and policy? These are all fair questions in an ethical battle such as this one. What kind of stance would you take? In a perfect world, everyone would be happy with the outcome of any type of conflict morally, or ethically. However, we all have minds, opinions, and that pesky thing called…the law. In the situation of Justin Ellsworth, he didn’t really have a choice at all. He died as an adult, fighting for his country, and his parents wanted access to his personal email. We ask, is this a breech of policy, or is it a right of the parents to see this email because he was their son, and they wanted to know his final thoughts? There are issues here though, that go beyond just what the parents wanted. Issues exist such as whether or not Justin himself would have wanted them to see it, and whether or not the internet provider had to let them see it due to privacy laws. The provider did have a privacy agreement with Justin, regardless if he is dead or alive. There is not a box to click saying “If I die, please allow my family to view my e-mails” on any website I have personally signed up on! I believe that the parents did not have a right to see his e-mail. If he wanted them to...
Words: 856 - Pages: 4
...The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy Ari Juels RSA Laboratories Ron Rivest MIT CSAIL Mike Szydlo RSA Laboratories What is a Radio-Frequency Identification (RFID) tag? • In terms of appearance… Chip (IC) Antenna What is an RFID tag? • You may own a few RFID tags… – Contactless physical-access cards – Automated toll payment • At present, an RFID tag simply calls out its (unique) name or static data over a short distance “Plastic #3” “74AB8” “5F8KJ3” The capabilities of basic RFID tags • No power – Receives power from reader – Range a few meters • Little memory – Static 64-to-128-bit identifier in current ultra-cheap generation (five cents / unit) – Hundreds of bits soon • Little computational power – A few thousand gates – No cryptographic functions available – Static keys for read/write permission The grand vision: RFID as next-generation barcode Barcode RFID tag Fast, automated scanning Line-of-sight Specifies object type Radio contact Uniquely specifies object Provides pointer to database entry for every object Commercial applications • Smoother inventory tracking – Military supply logistics • Gulf War I: Placement of double orders to ensure arrival • Gulf War II: RFID renders supply chain much more reliable • Product recalls • Anti-counterfeiting • Maintaining shelf stocks in retail environments – Gillette Mach3 razor blades • Parenting logistics – Water park uses RFID bracelets...
Words: 1064 - Pages: 5
...BIS/220 Version 1 April 9, 2010 Information Technology Acts Paper Many laws have been implemented by Congress to protect the integrity of United States citizens. With this fast technology growth. Several of these laws are not even ten years old, especially some Information Technology Acts. As the nation grows, our laws grow just as fast. Information Technology is the “acquisition, processing, storage and dissemination of vocal, pictorial, textual and numerical information by a microelectronics-based combination of telecommunications and computing”. Includes various areas incluing, computer software and hardware, programming langueages and processes. After doing extensive research in a lot of the Technology Acts, the following acts are going to be discussed within this paper; Computer Fraud and Abuse Act, (CFAA) 1986 and Children’s Protection Act, 2000 (CIPA). CFAA was introduced to reduce cracking of computer systems and to address Federal computer related offenses. This act, which is codified as 18 U.S.C § 1030 covers most federal computer related offenses. California was the first state to legislate a reporting requirement for computer hackers. The CFAA mainly deals with people who have exceeded the scope of authorized access and computer hackers. Computer Fraud and Abuse Act. The CFAA knows that a cyber-attack can damage a business as well as incur substantial costs responding to unauthorized use or computer hacking. It would not surprise me...
Words: 656 - Pages: 3
...Consensual Relationship Agreements Case Study By: Steven D. Gehring For: Dr. Nasser Assaf Class: Bus 520: Leadership and Organizational Behavior Date: 1 August 2012 Consensual Relationship Agreements Case Study P a g e | 2 “To date or not to date: that is the question: Whether it is nobler in the workplace to suffer the slings and arrows from outraged Human Resource personnel, Or to take the pen to their CRA and by signing love forever.” My apologies to William Shakespeare and his soliloquy from Hamlet (Act 3, Scene 1) but such is the state of affairs for many U.S. companies, human resource personnel and office personnel in today’s litigious world. Since of the days of World War II and later McCarthyism, women have moved into the U.S. work force in greater and greater numbers, filling positions ranging from oil field roustabout to mail room clerk to Chief Financial Officer and CEO. In the meantime, the U.S has experienced a major “sexual revolution” as well as associated changes in the attitudes affecting women in the work place. One of these is dating in the work place. Although no-dating policies are no longer the norm, the advent of anti-sexual harassment laws and the subsequent growth in the number and cost of lawsuits related to these laws, have lead the majority of companies to have in place policies that review the definition of sexual harassment, their company’s rules against it and the possible results to a person who engages in the sexual harassment...
Words: 2332 - Pages: 10
...When conducting any form of business in general, privacy is always a factor. Most people conduct business with the impression that their information is going over a secure network as well as being protected by the overall privacy guidelines used by many businesses. However, many companies uses data mining as a means of directly accommodating potential customers by observing their purchase history and interests. The issue at hand is merely determining how to minimize data mining as it is seen as a violation of privacy to some people. In the article by Minda Zetlin “The Latest Privacy Invasion: Retailer Tracking” the advantages, disadvantages, uses, and tips for minimizing data mining are discussed. Data mining is a statistical process that retailers use to understand their customer’s needs. Any time a customer uses a credit card that customer’s purchase and demographic data can be collected and used for retailer product placement or coupon mailings. Legal questions and concerns, like privacy and consumer rights, about data mining are debated on a regular basis. According to Jacob D. Furst, director of DePaul Information Assurance Center in an article from Zetlin (2012), “Every quarter we have a discussion about privacy with my students, and there’s always a debate” (para. 9). A concern about retailers collecting personal data includes purchasing information that could be used to determine insurance rates for a consumer who eats a large amount of fast food. Currently, consumers...
Words: 511 - Pages: 3
...conflicting interests concerns the privacy rights and considerations of the employees versus the rights of the employer to monitor the activities of its employees. A relaxed, comfortable workplace promotes good morale but too much comfort can result in a workforce that takes their responsibilities for granted. Achieving a happy medium is the ultimate goal. The development of modern technology has provided employers with increased opportunity to monitor the activities of their employees both on the job and off. Telephone, computers, voice mail, and the internet have provided employers with vehicles that were not available just a decade or so ago. Because of the newness of such devices, regulations and laws governing the use of them are not well developed. As a result, at the present time, employers are enjoying virtually unfettered opportunities to listen, watch, and read most anything and everything that their employees are doing while at work. Some more aggressive employers are even using such devices to do the same in regard to their employees’ private lives as well. In limited cases, some corporations and businesses have enacted policies limiting such interventions by the company but there are very few such companies. The concept of privacy is complicated. What is private for one person may not be for another and when it comes to privacy in the workplace the issue becomes even more complicated. From a legal point of view, what constitutes privacy is essentially the expectation...
Words: 1752 - Pages: 8
...Privacy laws and Policies XCOM / 285 04/08/12 After reviewing the Electronic Reserve Readings for our class and reading the classmates threads, I feel that communication privacy laws and policies are necessary in the work place. In this day and age of electronic communication it is very important for an employer to be aware of what an employee is doing on company time and with company property. As law suits are rampant, it is important for a company to protect itself and its employees. If an employee is sending potential sexually offensive material or just offensive material on company time and company property it is important for a company to be able to monitor and stop this action or be held accountable. In some companies an employer needs to be able to monitor an employee for sharing trade secrets and information that could potential harm or cause a loss in revenue. I however feel that it is of utmost importance for each company to determine how much surveillance is needed, with in the guide lines of the law. As brought out in our reading “The erosion of employee privacy by such practices as electronic monitoring and surveillance, however, comes at a cost in the form of increased stress and decreased employee morale, satisfaction and trust in their organization and management (Hornung 2005; Lee and Kleiner 2003). The Constitution’s fourth amendment also protects against “unreasonable search and seizure.” So with in each company a balance needs to be taken to protect themselves...
Words: 361 - Pages: 2
...employee’s everyday activities. At the same time, employees expect to have a certain comfort level by not having their space or privacy invaded in the workplace. “Tension between privacy and the need to know is heightened as computer technology revolutionizes information gathering.” (Halbert & Ingulli, 2010, p. 70) How can employees reasonably expect to have privacy when most companies are carrying some type of monitoring system that will allow employers to monitor the employee’s performance to see if their time is being utilized effectively? “According to a 2005 American Management Association survey, it states both the intensity and range of workplace surveillance is surging, from videotaping to monitoring of IM chat and blogging to GPS satellite tracking of cars and cell phones” (Halbert & Ingulli, 2010, p. 73). Technology has made it easy to track employees and their behavior on a daily basis. Most employers are becoming more knowledgeable on various types of electronic surveillance. For example, some employers monitor their employees email usage. Although, some employees may assume their emails are private; however, they are not. Deleted messages are stored into archive and are accessible to employers and others. (Halbert & Ingulli, 2010) In addition, technology has increased ways of surveillance and is constantly growing, leaving very little privacy in the workplace. For instance, there are programs that can take surreptitious “screen shots” of employees computer, Porn sweeper...
Words: 1222 - Pages: 5